The Quantum Threat: Why Act Now
Quantum computers are advancing rapidly. Between Shor's algorithm and "Harvest Now, Decrypt Later" strategies, the migration to post-quantum cryptography can no longer wait.
Read article →What we are learning about PQC migration, ANSSI timelines, and FPGA implementation — written by the engineering team in Rouen.
Quantum computers are advancing rapidly. Between Shor's algorithm and "Harvest Now, Decrypt Later" strategies, the migration to post-quantum cryptography can no longer wait.
Read article →The NIS2 and DORA directives impose new cryptographic requirements on European critical operators. Deadlines, penalties, and concrete steps toward compliance.
Read article →Published in August 2024 as FIPS 203, ML-KEM is the key encapsulation mechanism selected by NIST for the post-quantum era. Performance, security and integration overview.
Read article →How the AllEyes architecture removes the CPU from the cryptographic path to eliminate all software attack surface. Fully hardware-based network encryption.
Read article →The HNDL strategy involves intercepting and storing encrypted data today to decrypt it tomorrow with a quantum computer. A threat already active today.
Read article →Comparing FPGA and ASIC approaches for hardware implementation of post-quantum encryption algorithms. Why crypto-agility is essential.
Read article →Digital certificates and public key infrastructure must migrate to post-quantum algorithms to remain trustworthy.
Read article →IPsec VPN tunnels rely on key exchanges vulnerable to quantum computers. Migrating to post-quantum IKEv2 is urgent.
Read article →